Sie sind auf Seite 1von 326

AWS Certified SysOps Administrator

Click to edit Master title style


(Associate) Crash Course

Introduction
What is SYSOPS?
Click to edit Master title style
SYStems OPerationS
Course Prerequisites
Click to edit Master title style
Solid AWS service fundamentals
Previous AWS operations experience
CLI
Console
Command-line proficiency
Course Scope
Click to edit Master title style
In Scope Out of Scope

• Operations
• Limits • Service definition
• Trade-offs • Fundamentals
• Service scope • Global PoP
• Deployment • Architecture
choices
• Sample questions
Exam Dashboard
Click to edit Master title style
Where is the exam dashboard?

https://aws.amazon.com/certification/certified-sysops-
admin-associate/
Exam Dashboard
Click to edit Master title style
Job Description Analogy
Exam Dashboard
Click to edit Master title style
Job Description Analogy
Exam Dashboard
Click to edit Master title style
Job Description Analogy
Exam Blueprint
Click to edit Master title style
Where is the current exam guide?
https://d1.awsstatic.com/training-and-certification/docs-
sysops-associate/AWS%20Certified%20SysOps%20-
%20Associate_Exam%20Guide_Sep18.pdf

Yes, this guide does get updated periodically, hence the


date. Always check for new versions!
Exam Blueprint
Click to edit Master title style
Question Domains
Exam Blueprint
Click to edit Master title style

Explanation of
question
domains
TL; DR
Click to edit Master title style
Too Long; Didn’t Read
• Sysops requires understanding of architecture
• Fewer services to learn than Solutions Architect
Associate (SAA) certification
• Architecture answers “what” and “why”, Sysops
answers “how” and “when”
• Focus on monitoring and automation of tasks
Concepts
Click to edit Master title style
Deploy, manage, and operate scalable, highly available,
and fault tolerant systems on AWS

Operations Architecture

• Deploy • Scalable
• Manage • Highly
• Operate available
• Fault tolerant
Concepts
Click to edit Master title style
Implement and control the flow of data to and from AWS

• Network ingress and egress


• Import and export
• Content delivery
• Synchronous vs asynchronous
• Managed services
Concepts
Click to edit Master title style
Select the appropriate AWS service based on compute,
data, or security requirements

• Learn the Well-Architected Framework


• Security
• Reliability
• Performance Efficiency
• Cost Optimization
• Operational Excellence (NEW!)
Concepts
Click to edit Master title style
Identify appropriate use of AWS operational best practices

• Recognizing available options for operational tasks


• Understanding tradeoffs for each option
Concepts
Click to edit Master title style
Estimate AWS usage costs and identify operational cost
control mechanisms

• Learn service costs


• Stay current
• Cost Optimization Pillar
Concepts
Click to edit Master title style
Migrate on-premises workloads to AWS

• Architecture skills to plan


• Operations skills to execute, maintain and respond
AWS Certified SysOps Administrator
Click to edit Master title style
(Associate) Crash Course

AWS Knowledge
TL; DR
Click to edit Master title style
• Experience similar to a candidate requirements for a
job description
• Command line interface is rich with subtle options
• Know what they are and when to use them
• Focus on solutions using automation
• CLI and SDK have similar functionality
• Benefits and drawbacks of each
Candidate Overview
Click to edit Master title style
Minimum of one year hands-on experience with AWS

• Hands-on experience is priceless


• Time spent is less important than immersion
Candidate Overview
Click to edit Master title style
Experience managing/operating systems on AWS

• Create a personal account


• Use the Free Tier
• Experiment with CLI and SDK
• Experiment with boto (CLI written in Python)
Candidate Overview
Click to edit Master title style
Understanding of the AWS tenets –
architecting for the cloud
7Click
Tenets (Legacy)
to edit Master title style
1. Design for failure and nothing will fail
2. Implement elasticity
3. Leverage different storage options
4. Build security in every layer
5. Think parallel
6. Loose coupling sets you free
7. Don’t fear constraints
10 Design Principles (Current)
Click to edit Master title style
1. Scalability
2. Disposable Resources
3. Automation
4. Loose Coupling
5. Services, not Servers
6. Databases
7. Removing Single Points of Failure
8. Optimizing for Cost
9. Caching
10. Security
Candidate Overview
Click to edit Master title style
Service Scope

• AZ
• IAAS
• Region
• PAAS/SAAS
• Global
• No management of infrastructure
• DNS/CDN
Candidate Overview
Click to edit Master title style
Service Manageability

• Unmanaged
• Less HA/FT
• Building blocks
• Managed
• Range from PAAS to SAAS
• Less overhead
Candidate Overview
Click to edit Master title style
Understanding of network technologies as they relate to
AWS

• Build a VPC from scratch


• Create infrastructure that uses ELB
• Create infrastructure that uses CloudFront
Candidate Overview
Click to edit Master title style
Understanding of security concepts with hands-on
experience in implementing security controls and
compliance requirements

• Security as part of architecture, not afterthought


• Know how to monitor compliance
AWS CLI & SDK
Click to edit Master title style
AWS AW AW
Console S S
CLI SDK

AWS REST API Endpoints


AWS CLI
Click to edit Master title style
• Install
• Configure
• Command Format
• Advanced Commands – Query
• Advanced Commands – Filter
AWS CLI Linux & MacOS Install
Click to edit Master title style
Python module install
pip install awscli --upgrade --user

Standalone installer
curl "https://s3.amazonaws.com/aws-cli/awscli-bundle.zip" -o awscli-
bundle.zip
unzip awscli-bundle.zip
./awscli-bundle/install -b ~/bin/aws
AWS CLI Windows Install
Click to edit Master title style
Python module install (same as Linux and MacOS)
pip install awscli --upgrade --user

Standalone MSI installer


64-bit: https://s3.amazonaws.com/aws-cli/AWSCLI64.msi
32-bit: https://s3.amazonaws.com/aws-cli/AWSCLI32.msi
AWS CLI Configuration
Click to edit Master title style
aws configure [--profile profile-name]
AWS Access Key ID [None]:
AWS Secret Access Key [None]:
Default region name [None]:
Default output format [None]:

aws configure get <config option>


aws configure set <config option>
aws configure list
AWS CLI Configuration Advanced
Click to edit Master title style
IAM Role in .aws/config using a named profile
Same AWS account

[profile securityadmin]
role_arn = arn:aws:iam::123456789012:role/securityadmin
source_profile = default
AWS CLI Configuration Advanced
Click to edit Master title style
IAM Role in .aws/config using a named profile
Cross-account access
With MFA

[profile otheraccount]
role_arn = arn:aws:iam::234567890123:role/otheraccount
source_profile = default
mfa_serial = arn:aws:iam::123456789012:mfa/chadsmith
external_id = 456789
AWS CLI Command Help
Click to edit Master title style
aws <service> <action> help
• Context-sensitive
• Paginated
• Examples
AWS CLI Command Format
Click to edit Master title style
--profile
great for assuming roles
--region
specify the region of the resource acted upon
--output
json for schema and structured output
text to remove formatting
table for human readable format
--endpoint-url
can help avoid latency issues
AWS CLI Command Format
Click to edit Master title style
--generate-cli-skeleton
works with --cli-input-json
used for many actions
output includes all possible options
provides more structure than cli options
great for operations and automation
AWS CLI Queries
Click to edit Master title style
--query
restrict output to specific properties
requires JSON schema for specific API method
JMESPath query expressions supported
use for chaining commands together
use for setting variables in scripts
AWS CLI Filters
Click to edit Master title style
--filter
restrict output to specific objects
reduces the response set, which can save time
different for every API operation
contextual help for documentation
AWS CLI Example
Click to edit Master title style
aws ec2 describe-instances --output text \

--query 'Reservations[*].Instances[?not_null(Tags[?Key ==
`Name`].Value)].[join(`,`,Tags[?Key==`Name`].Value),InstanceId,Publ
icDnsName,PrivateDnsName]' \

--filter Name=group-name,Values=secgroupprefix* \
Name=instance-state-name,Values=running

Options JSON schema JMESQuery unique filter


AWS CLI Example
Click to edit Master title style
aws ec2 describe-instances --output text \

--query 'Reservations[*].Instances[?not_null(Tags[?Key ==
`Name`].Value)].[join(`,`,Tags[?Key==`Name`].Value),InstanceId,Publ
icDnsName,PrivateDnsName]’ \

--filter Name=group-name,Values=secgroupprefix* \
Name=instance-state-name,Values=running

Options JSON schema JMESQuery unique filter


AWS CLI Example
Click to edit Master title style
aws ec2 describe-instances --output text \

--query 'Reservations[*].Instances[?not_null(Tags[?Key ==
`Name`].Value)].[join(`,`,Tags[?Key==`Name`].Value),InstanceId,
PublicDnsName,PrivateDnsName]’ \

--filter Name=group-name,Values=secgroupprefix* \
Name=instance-state-name,Values=running

Options JSON schema JMESQuery unique


filter
AWS CLI Example
Click to edit Master title style
aws ec2 describe-instances --output text \

--query 'Reservations[*].Instances[?not_null(Tags[?Key ==
`Name`].Value)].[join(`,`,Tags[?Key==`Name`].Value),InstanceId,Pu
blicDnsName,PrivateDnsName]’ \

--filter Name=group-name,Values=secgroupprefix* \
Name=instance-state-name,Values=running

Options JSON schema JMESQuery unique filter


AWS CLI Example
Click to edit Master title style
aws ec2 describe-instances --output text \

--query 'Reservations[*].Instances[?not_null(Tags[?Key ==
`Name`].Value)].[join(`,`,Tags[?Key==`Name`].Value),InstanceId,Publ
icDnsName,PrivateDnsName]’ \

--filter Name=group-name,Values=secgroupprefix* \
Name=instance-state-name,Values=running

Options JSON schema JMESQuery unique filter


AWS SDK Options
Click to edit Master title style
Android
.Net
C++
Node.js
Go
PHP
iOS
Python
IoT SDK
Ruby
Java
Mobile SDK
Always check
documentation!
CLI vs SDK for operations
Click to edit Master title style

CLI SDK

• Text • Objects
• Easy • Portable
CLI vs SDK Bash
Click to edit Master title style
#!/bin/bash
region=$1
vols=`aws ec2 describe-volumes --region $region --filters \
Name=status,Values=available \
--query Volumes[].VolumeId | tr -s '\t' '\n'`

for i in $vols; do
aws ec2 delete-volume --region $region --volume-id $i --
dry-run
done
CLI vs SDK Python
Click to edit Master title style
#!/usr/bin/python
import boto3, sys
region = sys.argv[1]
ec2 = boto3.resource("ec2", region_name=region)
available_volumes = ec2.volumes.filter(
Filters=[{'Name': 'status', 'Values': ['available']}]
)
for volume in available_volumes:
volume.delete(DryRun=True)
CLI vs SDK Python (Lambda)
Click to edit Master title style
import boto3
def lambda_handler(event, context):
regionid = event['region']
ec2 = boto3.resource("ec2", region_name=regionid)
available_volumes = ec2.volumes.filter(
Filters=[{'Name': 'status', 'Values': ['available']}]
)
for volume in available_volumes:
volume.delete(DryRun=True)
Question Breakdown
Click to edit Master title style
Which command can you run to understand syntax and task-specific
options for creating an EBS volume?

A. aws efs help


B. aws ec2 ebs create help
C. aws ec2 create-volume help
D. aws ebs create-volume help
Breakdown – Key Terms
Click to edit Master title style
Which command can you run to understand syntax and task-specific
options for creating an EBS volume?

A. aws efs help


B. aws ec2 ebs create help
C. aws ec2 create-volume help
D. aws ebs create-volume help
Breakdown – Answer Selection
Click to edit Master title style
Which command can you run to understand syntax and task-specific
options for creating an EBS volume?
EFS is a different service, not
related to EBS

A. aws efs help


B. aws ec2 ebs create help
C. aws ec2 create-volume help
D. aws ebs create-volume help
Breakdown – Answer Selection
Click to edit Master title style
Which command can you run to understand syntax and task-specific
options for creating an EBS volume?
First two terms correct but ebs
isn’t a task

A. aws efs help


B. aws ec2 ebs create help
C. aws ec2 create-volume help
D. aws ebs create-volume help
Breakdown – Answer Selection
Click to edit Master title style
Which command can you run to understand syntax and task-specific
options for creating an EBS volume?
This looks right! EBS actions
are under EC2 in the CLI

A. aws efs help


B. aws ec2 ebs create help
C. aws ec2 create-volume help
D. aws ebs create-volume help
Breakdown – Answer Selection
Click to edit Master title style
Which command can you run to understand syntax and task-specific
options for creating an EBS volume?
EBS isn’t a service

A. aws efs help


B. aws ec2 ebs create help
C. aws ec2 create-volume help
D. aws ebs create-volume help
Breakdown – Answer Selection
Click to edit Master title style
Which command can you run to understand syntax and task-specific
options for creating an EBS volume?
Answer: C

A. aws efs help


B. aws ec2 ebs create help
C. aws ec2 create-volume help
D. aws ebs create-volume help
AWS Certified SysOps Administrator
Click to edit Master title style
(Associate) Crash Course

Domain 1 - Monitoring
and Reporting
Monitoring and Reporting
Click to edit Master title style
• 22% of the exam content
• Create and maintain metrics and alarms utilizing
AWS monitoring services
• Recognize and differentiate performance and
availability metrics
• Perform the steps necessary to remediate based on
performance and availability metrics
TL; DR
Click to edit Master title style
• CloudWatch metrics can be viewed in different ways
• Learn the common metrics for covered services
• Know which services have status checks
• Know the integration points between monitoring
services and automated remediation
CloudWatch Entry Points
Click to edit Master title style
CloudWatch
Console
CloudWatch Entry Points
Click to edit Master title style
Resource
Dashboards
CloudWatch Entry Points
Click to edit Master title style
CLI

current_cpu=`aws cloudwatch --region $region get-metric-statistics \


--namespace AWS/EC2 --metric-name CPUUtilization \
--start-time $onehourago --end-time $now \
--period 3600 --statistics Average --dimensions Name=InstanceId,Value=$iid \
--query Datapoints[].Average --output text`
CloudWatch Metrics
Click to edit Master title style
• Performance Metrics
• Determination whether resource is performing as
expected
• Can be used to trigger passive or active responses
CloudWatch Metric Highlights
Click to edit Master title style

CPUCreditBalance
CPUUtilization
NetworkIn
NetworkOut
EC2
CloudWatch Metric Highlights
Click to edit Master title style
VolumeIdleTime
VolumeQueueLengt
h
VolumeReadBytes
VolumeReadOps
VolumeWriteBytes
EBS VolumeWriteOps
CloudWatch Metric Highlights
Click to edit Master title style
BackendConnectionErrors
HTTPCode_Backend_2XX, 3XX, 4XX,
5XX
HTTPCode_ELB_4XX,5XX
RequestCount
SpilloverCount
Classic LB SurgeQueueLength
UnHealthyHostCount
CloudWatch Metric Highlights
Click to edit Master title style
ActiveConnectionCount
ConsumedLCUs
HealthyHostCount
HTTPCode_ELB_4XX_Count,5XX_Count
HTTPCode_Target_2XX_Count,3XX_Count
HTTPCode_Target_4XX_Count,5XX_Count
NewConnectionCount
Application LB RejectedConnectionCount
RequestCount
RequestCountPerTarget
RuleEvaluations
TargetConnectionErrorCount
TargetResponseTime
UnHealthyHostCount
CloudWatch Metric Highlights
Click to edit Master title style
ActiveFlowCount
ConsumedLCUs
HealthyHostCount
NewFlowCount
TCP_Client_Reset_Count
TCP_ELB_Reset_Count
TCP_Target_Reset_Count
Network LB UnHealthyHostCount
CloudWatch Metric Highlights
Click to edit Master title style
CPUUtilization
DatabaseConnections
FreeStorageSpace
ReadIOPS
WriteIOPS
RDS (Non-Aurora)
CloudWatch Metric Highlights
Click to edit Master title style
ActiveTransactions
BlockedTransactions
CommitThroughput
DeleteThroughput
InsertLatency
RDS (Aurora) (Lots of Latency/Throughput)
CloudWatch Metric Highlights
Click to edit Master title style
ConsumedReadCapacityUnits
ConsumedWriteCapacityUnits
ReadThrottleEvents
WriteThrottleEvents
DynamoDB
CloudWatch Custom Metrics
Click to edit Master title style
• Required for anything generated inside the OS
• Shared Responsibility Model coming later
• Can be pushed from on-prem resources
• Good for application metrics

OS memory usage database queries/second


OS disk space usage nginx active connections
JVM heap space usage MongoDB secondary lag
message queue depth
CloudWatch Alarms
Click to edit Master title style
OK = Not always OK
ALARM = not always actionable
INSUFFICIENT_DATA = not always a problem

More than just < , = or >


High Resolution Alarms
Percentile Alarms
Low Data Samples
CloudWatch Alarm Actions
Click to edit Master title style
EC2 – Stop, Reboot, Terminate, Recover

Autoscaling – Execute Scaling Policy

SNS – Notifications
Email
Notify
SMS is
HTTP/HTTPS PASSIVE
SNS - Trigger
Lambda function
CloudWatch Alarm Actions
Click to edit Master title style
EC2 – Stop, Reboot, Terminate, Recover

Autoscaling – Execute Scaling Policy

SNS – Notifications
Email
Remediate
SMS is
HTTP/HTTPS ACTIVE
SNS - Trigger
Lambda function
CloudWatch Events
Click to edit Master title style
Doesn’t require metrics
More like a transaction log

Events -> Rules -> Targets


Lambda

SSM Run Command

Kinesis Firehose

And more!
CloudWatch Logs
Click to edit Master title style
Action Details
Aggregate Multiple sources

Store Durable and reliable

Access Console, CLI, SDK

Monitor Metric filters


CloudWatch Logs
Click to edit Master title style
No single point of failure
Integration with AWS Ecosystem
Aggregation point for custom logs (requires agent)
EC2
On premises
CloudWatch Logs Agent
Click to edit Master title style
Single command install
Requires configuration file
Great for OS and application logs
Automate install
• AMI
• EC2 user-data
• Configuration management software
• EC2 Run-command
Access Logs
Click to edit Master title style
S3
ELB Stored in S3
Cloudfront/WAF

Stored in
API Gateway
CloudWatch
Logs
Log Monitoring and Storage
Click to edit Master title style

CloudWatch S3
Logs
Log Monitoring and Storage
Click to edit Master title style

API Gateway

CloudWatch S3
Logs
Log Monitoring and Storage
Click to edit Master title style

API Gateway ALB

CloudWatch S3
Logs
Log Monitoring and Storage
Click to edit Master title style

API Gateway ALB

CloudWatch S3
Logs

EC2
Log Monitoring and Storage
Click to edit Master title style

API Gateway ALB

CloudWatch S3
Logs

EC2 VPC Flow Logs


Log Monitoring and Storage
Click to edit Master title style

API Gateway CloudTrail ALB

CloudWatch S3
Logs

EC2 VPC Flow Logs


Log Monitoring and Storage
Click to edit Master title style

CloudWatch S3
Logs
Log Monitoring and Storage
Click to edit Master title style

Lambda
CloudWatch S3
Logs
Status Checks
Click to edit Master title style
• Availability Metrics
• Determination whether resource is accessible
• Can indicate failures at infrastructure tier
EC2 Status Checks
Click to edit Master title style
• System Status Checks
• Network connectivity
• Physical host power
• Physical host OS issues
• Physical host H/W issues
EC2 Status Checks
Click to edit Master title style
• Instance Status Checks
• Network configuration issue
• OS configuration issue
• OOM
• Corrupt volume
• Kernel issue
EBS Volume Status Check
Click to edit Master title style
• ok
• warning
• impaired
• insufficient-data
EBS Volume Perf Status Check
Click to edit Master title style
• ok
• Normal volume performance
• warning
• Degraded or Severely Degraded volume performance
• impaired
• Stalled or Not Available
• insufficient-data
RDS Status Checks
Click to edit Master title style
• Available
• Backing-up
• Configuring-enhanced-monitoring
• Creating
• Deleting
• Failed
• Inaccessible-encryption-credentials
• Incompatible-credentials
RDS Status Checks cont’d
Click to edit Master title style
• Incompatible-network
• Incompatible-option-group
• Incompatible-parameters
• Incompatible-restore
• Maintenance
• Modifying
• Rebooting
• Renaming
RDS Status Checks cont’d
Click to edit Master title style
• Resetting-master-credentials
• Restore-error
• Starting
• Stopping
• Stopped
• Storage-full
• Storage-optimization
• Upgrading
RedShift Cluster Status
Click to edit Master title style
• Available
• Creating
• Deleting
• Final-snapshot
• Hardware-failure
• Incompatible-hsm
• Incompatible-network
• Incompatible-parameters
RedShift Cluster Status cont’d
Click to edit Master title style
• Incompatible-restore
• Modifying
• Rebooting
• Renaming
• Resizing
• Rotating-keys
• Storage-full
• Updating-hsm
Remediate After Monitoring
Click to edit Master title style
• Learn ways to optimize network performance
• Know how to recognize bottlenecks
Maximize Performance
Click to edit Master title style
• Single AZ
• Placement group
• Enhanced networking
• Jumbo frames
• Keep traffic inside VPC
• VGW vs Direct Connect
Identify Bottlenecks
Click to edit Master title style
• Undersized NAT instance
• Undersized RDS instance
• Undersized EC2 instance
• Old EC2 instance type
• Underprovisioned EBS volume
• Latency from cross-AZ traffic
• Serving static assets from EC2
• Aggregating S3 requests from single instance
Question Breakdown
Click to edit Master title style
Your company runs RabbitMQ on EC2, and wants to push custom
metrics from the application into CloudWatch. Instances are
launched into an IAM Role with appropriate permissions to
accomplish this. There is a security requirement to track CloudWatch
API calls to ensure an audit trail. How can this requirement be met?
A. Install the CloudWatch Logs Agent on the EC2 instances.
B. Enable detailed monitoring on the EC2 instances.
C. Create a CloudWatch Alarm on each RabbitMQ custom metric.
D. Enable AWS CloudTrail in the same region as the EC2 instances.
Breakdown – Key Terms
Click to edit Master title style
Your company runs RabbitMQ on EC2, and wants to push custom
metrics from the application into CloudWatch. Instances are
launched into an IAM Role with appropriate permissions to
accomplish this. There is a security requirement to track
CloudWatch API calls to ensure an audit trail. How can this
requirement be met?
A. Install the CloudWatch Logs Agent on the EC2 instances.
B. Enable detailed monitoring on the EC2 instances.
C. Create a CloudWatch Alarm on each RabbitMQ custom metric.
D. Enable AWS CloudTrail in the same region as the EC2 instances.
Breakdown – Answer Selection
Click to edit Master title style
Your company runs RabbitMQ on EC2, and wants to push custom
metrics fromEnables CloudWatch
the application into CloudWatch. Logs
Instances are
launched into an IAM Role with appropriate permissions to
integration, but doesn’t meet
accomplish this. There is a security requirement to track
CloudWatch API calls to requirement.
ensure an audit trail. How can this
requirement be met?
A. Install the CloudWatch Logs Agent on the EC2 instances.
B. Enable detailed monitoring on the EC2 instances.
C. Create a CloudWatch Alarm on each RabbitMQ custom metric.
D. Enable AWS CloudTrail in the same region as the EC2 instances.
Breakdown – Answer Selection
Click to edit Master title style
Your company runs RabbitMQ on EC2, and wants to push custom
metrics from the application into CloudWatch. Instances are
Justanchanges
launched into IAM Role withpolling
appropriateperiod forto
permissions
CloudWatch
accomplish this. There is a security requirement to track
CloudWatch API calls to ensure an audit trail. How can this
requirement be met?
A. Install the CloudWatch Logs Agent on the EC2 instances.
B. Enable detailed monitoring on the EC2 instances.
C. Create a CloudWatch Alarm on each RabbitMQ custom metric.
D. Enable AWS CloudTrail in the same region as the EC2 instances.
Breakdown – Answer Selection
Click to edit Master title style
Your company runs RabbitMQ on EC2, and wants to push custom
metrics from the application into CloudWatch. Instances are
Enables
launched into alerts
an IAM Role and actions
with appropriate butto
permissions
no
accomplish this. There is auditrequirement
a security trail to track
CloudWatch API calls to ensure an audit trail. How can this
requirement be met?
A. Install the CloudWatch Logs Agent on the EC2 instances.
B. Enable detailed monitoring on the EC2 instances.
C. Create a CloudWatch Alarm on each RabbitMQ custom
metric.
D. Enable AWS CloudTrail in the same region as the EC2 instances.
Breakdown – Answer Selection
Click to edit Master title style
Your company runs RabbitMQ on EC2, and wants to push custom
metrics from the application into CloudWatch. Instances are
CloudTrail
launched into logs
an IAM Role with enable
appropriate audit to
permissions
trailThere
accomplish this. andis ameets requirement
security requirement to track
CloudWatch API calls to ensure an audit trail. How can this
requirement be met?
A. Install the CloudWatch Logs Agent on the EC2 instances.
B. Enable detailed monitoring on the EC2 instances.
C. Create a CloudWatch Alarm on each RabbitMQ custom metric.
D. Enable AWS CloudTrail in the same region as the EC2
instances.
Breakdown – Answer Selection
Click to edit Master title style
Your company runs RabbitMQ on EC2, and wants to push custom
metrics from the application into CloudWatch. Instances are
launched into an IAM Role with appropriate permissions to
Answer: D
accomplish this. There is a security requirement to track
CloudWatch API calls to ensure an audit trail. How can this
requirement be met?
A. Install the CloudWatch Logs Agent on the EC2 instances.
B. Enable detailed monitoring on the EC2 instances.
C. Create a CloudWatch Alarm on each RabbitMQ custom metric.
D. Enable AWS CloudTrail in the same region as the EC2 instances.
AWS Certified SysOps Administrator
Click to edit Master title style
(Associate) Crash Course

Domain 2 - High
Availability
High Availability
Click to edit Master title style
• 8% of exam content
• Implement scalability and elasticity based on use
case
• Recognize and differentiate highly available and
resilient environments on AWS
TL; DR
Click to edit Master title style
• Learn common deployment patterns for HA
• Just in time provisioning
• Trend toward temporary resources
• Trend toward managed services
• Trend toward regional scope over AZ scope
• Multi-regional deployments increase availability and
cost
• Focus on details over strategy
• How does HA affect operations?
Terms
Click to edit Master title style
Fault Tolerance - The system will continue to function
without degradation in performance despite the
complete failure of any component of the architecture.

High Availability - The system will continue to function


despite the complete failure of any component of the
architecture.

Fault tolerant services are ALSO highly available, but the


reverse is not necessarily true
VPC
Click to edit Master title style
Availability Zone Availability Zone

VPC
Private subnet Private subnet

Private subnet Private subnet


VPC
Click to edit Master title style
Availability Zone Availability Zone

VPC
Private subnet Private subnet

Multiple AZ
Private subnet Private subnet
VPC
Click to edit Master title style
Availability Zone Availability Zone

VPC
Private subnet Private subnet

Multiple
subnets with
different
Private subnet Private subnet
internet
accessibility
VPC
Click to edit Master title style
Availability Zone Availability Zone

VPC
Private subnet Private subnet

NAT GW per
Private subnet Private subnet

AZ
VPC
Click to edit Master title style
Availability Zone Availability Zone

VPC
Internet Gateway
Private subnet Private subnet

VPC Endpoint

Virtual
Private
Private subnet Private subnet
Gateway

Egress points
are all HA/FT
ELB
Click to edit Master title style
Inherently HA, scalable and elastic
Classic
• Layer 4 or 7
• Supports EC2 Classic
• ALB
• Layer 7
• Path-based routing
• NLB
• Layer 4
• Static IP entry point
Decoupling with SNS and SQS
Click to edit Master title style
Decoupling with SNS and SQS
Click to edit Master title style
Publish message to
start workflow

SNS topic
Decoupling with SNS and SQS
Click to edit Master title style
SQS Queues
Same message to 3
queues for 3 tasks
Decoupling with SNS and SQS
Click to edit Master title style
3 ASG perform
tasks
independently

Autoscaling and EC2


Auto Scaling
Click to edit Master title style
Flagship service
• Achieve several best practices at once
• Highly available
• Cost optimized
• Temporary resources
• Regional service scope
• Read ALL docs on Auto Scaling operations
• Learn Auto Scaling scenarios
Auto Scaling Basics
Click to edit Master title style

Launch Auto Scaling Auto Scaling Scheduled


Template Group Policies Actions
• Instance • Location • Event-driven • Calendar-
details • Limits scaling driven scaling
• Associations
Auto Scaling Operations
Click to edit Master title style
• Manage Auto Scaling policies and step scaling
• Monitor ASG min and max instances
• Roll out updated launch configuration
• Manual tasks for lifecycle hooks
• Manage cooldown periods
Auto Scaling Scenarios
Click to edit Master title style
• Stateless web applications
• Unpredictable traffic
• Steady-state groups
• Message queue consumption applications
Auto Scaling Anti-Scenarios
Click to edit Master title style
• Applications with session stickiness
• Monolithic applications (singleton instance)
• Applications with fixed IP addresses
• Applications with many manual deploy steps
• Applications with short, large, random traffic spikes
Route53 Basics
Click to edit Master title style
• Register domains and serve DNS records
• 100% uptime SLA
• Several routing options
• Health checks
• Failover options
• Integration points with AWS resources
Route53 for HA
Click to edit Master title style
• Direct traffic to multiple regions for resiliency
• Latency-based routing
• Weighted round robin
• Health checks to avoid degraded endpoints
• ALIAS records
• Pointer to AWS resources
• Avoid using IP addresses as SPoF
EC2 Autorecovery
Click to edit Master title style
• Alternative to Auto Scaling for steady state
• Maintain instance ID
• Migration to new hardware during reboot
• Recover on demand or use a CloudWatch alarm
• Restrictions on valid instance types
RDS
Click to edit Master title style
Assumes most operational overhead of DB servers
• OS installation/configuration
• Database software installation/configuration
• Backups
• Patches/updates
• Failover
• Replication
= Reduced risk
= Higher availability
RDS Operations
Click to edit Master title style
No service
Service interruption
interruption
• Snapshots (daily • Configuring Multi-AZ
automated or deployment
manual) • Multi-AZ failover
• Storage upsize • DB Engine update
• Add Read Replica • Parameter update
Elastic Beanstalk
Click to edit Master title style
• Assumes operational overhead of managing
environments, including updates and rollback
• Region-scoped service that supports multiple AZ
• Can be configured with no single points of failure
• Platform deploys choices of the following:
• Elastic Load Balancer
• EC2
• Auto Scaling
• RDS
Elastic Beanstalk Context
Click to edit Master title style
Availability Zone Availability Zone

VPC
Private subnet Private subnet

Private subnet Private subnet


Elastic Beanstalk Further Reading
Click to edit Master title style
• Supported web server software
• Supported languages
• Application cloning workflow
• Application deployment options
• Deployment rollback options
Understanding Tradeoffs
Click to edit Master title style
• Scalability
• Elasticity
• Cost
• Performance
Question Breakdown
Click to edit Master title style
Your organization has an S3 bucket named company_critical_files
used to store file backups from an important source. You’ve been
asked to evaluate the availability of this bucket, and make
recommendations to improve the availability. What solution would
you recommend?

A. Create an S3 bucket in a different region than


company_critical_files. Enable versioning on both buckets, then
enable cross-region replication to the new bucket.
B. Use a bucket policy to disable deletes on the bucket.
C. No changes. 4 9s of availability is enough.
D. Enable versioning on company_critical_files.
Breakdown – Key Terms
Click to edit Master title style
Your organization has an S3 bucket named company_critical_files
used to store file backups from an important source. You’ve been
asked to evaluate the availability of this bucket, and make
recommendations to improve the availability. What solution would
you recommend?

A. Create an S3 bucket in a different region than


company_critical_files. Enable versioning on both buckets, then
enable cross-region replication to the new bucket.
B. Use a bucket policy to disable deletes on the bucket.
C. No changes. 4 9s of availability is enough.
D. Enable versioning on company_critical_files.
Breakdown – Answer Selection
Click to edit Master title style
Your organization has an S3 bucket named company_critical_files
used to store file backups from an important source. You’ve been
Replication
asked to evaluate to aofsecond
the availability this bucket,region
and make
recommendationsincreases
to improve theavailability
availability. What solution would
you recommend?

A. Create an S3 bucket in a different region than


company_critical_files. Enable versioning on both buckets,
then enable cross-region replication to the new bucket.
B. Use a bucket policy to disable deletes on the bucket.
C. No changes. 4 9s of availability is enough.
D. Enable versioning on company_critical_files.
Breakdown – Answer Selection
Click to edit Master title style
Your organization has an S3 bucket named company_critical_files
used to store file backups from an important source. You’ve been
Disabling
asked to evaluate deletes
the availability doesn’t
of this bucket, and make
recommendations to change
improve the availability
availability. What solution would
you recommend?

A. Create an S3 bucket in a different region than


company_critical_files. Enable versioning on both buckets, then
enable cross-region replication to the new bucket.
B. Use a bucket policy to disable deletes on the bucket.
C. No changes. 4 9s of availability is enough.
D. Enable versioning on company_critical_files.
Breakdown – Answer Selection
Click to edit Master title style
Your organization has an S3 bucket named company_critical_files
used to store file backups from an important source. You’ve been
Doesn’t
asked to evaluate the address
availability theand make
of this bucket,
requirement
recommendations to improve the availability. What solution would
you recommend?

A. Create an S3 bucket in a different region than


company_critical_files. Enable versioning on both buckets, then
enable cross-region replication to the new bucket.
B. Use a bucket policy to disable deletes on the bucket.
C. No changes. 4 9s of availability is enough.
D. Enable versioning on company_critical_files.
Breakdown – Answer Selection
Click to edit Master title style
Your organization has an S3 bucket named company_critical_files
Versioning
used to store file helps
backups from an prevent
important source. You’ve been
asked to evaluate the availability of this bucket, and make
accidental deletion, no effect on
recommendations to improve the availability. What solution would
you recommend? availability
A. Create an S3 bucket in a different region than
company_critical_files. Enable versioning on both buckets, then
enable cross-region replication to the new bucket.
B. Use a bucket policy to disable deletes on the bucket.
C. No changes. 4 9s of availability is enough.
D. Enable versioning on company_critical_files.
Breakdown – Answer Selection
Click to edit Master title style
Your organization has an S3 bucket named company_critical_files
used to store file backups from an important source. You’ve been
asked to evaluate the availability of this bucket, and make
Answer: A
recommendations to improve the availability. What solution would
you recommend?

A. Create an S3 bucket in a different region than


company_critical_files. Enable versioning on both buckets, then
enable cross-region replication to the new bucket.
B. Use a bucket policy to disable deletes on the bucket.
C. No changes. 4 9s of availability is enough.
D. Enable versioning on company_critical_files.
AWS Certified SysOps Administrator
Click to edit Master title style
(Associate) Crash Course

Domain 3 - Deployment
and Provisioning
Deployment and Provisioning
Click to edit Master title style
• 14% of exam content
• Identify and execute steps required to provision
cloud resources
• Identify and remediate deployment issues
TL; DR
Click to edit Master title style
• Know how to deploy individual resources
• Understand how to deploy groups of resources
• Deployment choices are not mutually exclusive
• Learn limitations of Infrastructure As Code options
• Identify tools for troubleshooting issues
Provision Cloud Resources
Click to edit Master title style
Manual Provisioning

• Console – can’t be automated


• CLI – can be converted to automation
• SDK – can be converted to automation
• API – can be automated, CLI/SDK easier?
Provisioning EC2 with AMIs
Click to edit Master title style
Spectrum from fully-baked to base image and everything
in between

• Know how to design for speed (fully-baked)


• Know how to design for flexibility (base image)
• Bootstrapping building blocks
• User-data
• Cloudformation cfn-update
• Configuration management software
Provision and Automate
Click to edit Master title style
Service Name Infrastructure Infrastructure Change Code Deploy
Deploy
CloudFormation ✓ ✓ (sorta)
Opsworks ✓ ✓ ✓
Elastic Beanstalk ✓ ✓ ✓
SSM Run Command ✓
ECS/EKS ✓ ✓ ✓
CodeDeploy ✓
3rd Party (depends) (depends) (depends)
Provision and Automate
Click to edit Master title style
Service Name Infrastructure Infrastructure Change Code Deploy
Deploy
CloudFormation ✓ ✓ (sorta)
OpsWorks ✓ ✓ ✓
Elastic Beanstalk ✓ ✓ ✓
Supports Container
SSM Run-Command ✓
Deployments!
ECS/EKS ✓ ✓ ✓
CodeDeploy ✓
3rd Party (depends) (depends) (depends)
CloudFormation Basics
Click to edit Master title style
Flagship service

• Infrastructure as Code (JSON, YAML)


• Integrated with most of AWS
• Exceptions are documented
• Deploy infrastructure and changes
• Does NOT operate on data
CloudFormation Template
Click to edit Master title style
Description
Metadata
Parameters
Mappings
Conditions
Transform – NEW!
Resources – only required section
Output
CloudFormation Template
Click to edit Master title style
Description
Metadata
Parameters
Mappings
Conditions Focus
Transform – NEW! here!
Resources
Output
CloudFormation Study Hints
Click to edit Master title style
1. How can your template be used in multiple regions?
2. What happens when the template creation fails?
3. What happens when the template update fails?
4. Which designs require explicit dependencies?
5. Which resources are replaced upon stack update?
6. Which resources are retained upon stack delete?
7. What are change sets and why are they important?
OpsWorks Basics
Click to edit Master title style
Configuration Management + IAC

• Chef Automate
• Puppet Enterprise
• Stacks consist of layers
• EC2
• Elastic Load Balancing
• RDS
• ECS
• Custom
OpsWorks Key Concepts
Click to edit Master title style
• Good for Chef/Puppet shops (hybrid environments)
• Integrated with Auto Scaling
• Focuses on resources similar to on-prem networks
• Managed service = highly available
• Many integration points with AWS ecosystem
Elastic Beanstalk Basics
Click to edit Master title style
Covered earlier
Elastic Beanstalk Key Concepts
Click to edit Master title style
• Manages platform
• ELB
• Auto Scaling
• RDS
• Used for resource create, update, and delete actions
• Still requires OS management
• Does not address backups
• Does not address multi-regional deployment
SSM Run Command Basics
Click to edit Master title style
• Runs manual or scheduled tasks
• Works in hybrid environments
• Parallelized
• Track results and errors
• Easier to troubleshoot in bulk than manual operations
• Requires agent
• Requires access to SSM service API endpoint
ECS Basics
Click to edit Master title style
• Deploy containers without managing infrastructure
• Supports Docker and Windows containers
• Choice of deployment via EC2 or Fargate
• Supports existing VPC infrastructure
EKS Basics
Click to edit Master title style
• Similar to ECS, but uses Kubernetes
• Deploy Docker containers without managing
infrastructure
• Choice of deployment via EC2 or Fargate
• Supports existing VPC infrastructure
• Hybrid infrastructure support
CodeDeploy Basics
Click to edit Master title style
• Deploy to EC2, Lambda, or on-premises
• File and command-based framework
• Rolling updates
• Blue/green deployments
• Stop and rollback
• Does NOT provision network or compute
infrastructure
Blue-Green Deployment
Click to edit Master title style

Weighted
RR Routing

Elastic Beanstalk
Blue-Green Deployment
Click to edit Master title style

Weighted
RR Routing

CloudFormation
Blue-Green Deployment
Click to edit Master title style
Launch Config 1

Launch Config 2

Auto Scaling
Blue-Green Deployment
Click to edit Master title style
How many other possibilities?
• ECS
• OpsWorks
• CodeDeploy
• Multiple options for Elastic Beanstalk
• Multiple options for CloudFormation
• Multiple options for Autoscaling
• And others!
Question Breakdown
Click to edit Master title style
Your R&D team wants to deploy a new application using
Docker containers. Which services can be used to
deploy and manage the containers? (pick three)

A. EC2
B. AWS Lambda
C. Elastic MapReduce
D. Elastic Container Service
E. AWS Systems Manager
F. Elastic Beanstalk
Breakdown – Key Terms
Click to edit Master title style
Your R&D team wants to deploy a new application using
Docker containers. Which services can be used to
deploy and manage the containers? (pick three)

A. EC2
B. AWS Lambda
C. Elastic MapReduce
D. Elastic Container Service
E. AWS Systems Manager
F. Elastic Beanstalk
Breakdown – Answer Selection
Click to edit Master title style
Your R&D team wants to deploy a new application using
Docker containers.
EC2 is theWhich
Swissservices
army can be used
knife of to
deploy and manage the containers? (pick three)
AWS, and supports containers
A. EC2
B. AWS Lambda
C. Elastic MapReduce
D. Elastic Container Service
E. AWS Systems Manager
F. Elastic Beanstalk
Breakdown – Answer Selection
Click to edit Master title style
Your R&D team wants to deploy a new application using
Lambda isWhich
Docker containers. entirely serverless,
services can be used to
with no
deploy and manage thecontrol over
containers? (pick three)
infrastructure
A. EC2
B. AWS Lambda
C. Elastic MapReduce
D. Elastic Container Service
E. AWS Systems Manager
F. Elastic Beanstalk
Breakdown – Answer Selection
Click to edit Master title style
Your R&D team wants to deploy a new application using
Docker containers.
EMR is aWhich services
managed can be used to
Hadoop
deploy and manage the containers? (pick three)
framework, not Docker
A. EC2
B. AWS Lambda
C. Elastic MapReduce
D. Elastic Container Service
E. AWS Systems Manager
F. Elastic Beanstalk
Breakdown – Answer Selection
Click to edit Master title style
Your R&D team wants to deploy a new application using
Docker containers.
ContainersWhich services
are can be used to
the primary
deploy and manage the containers? (pick three)
function of ECS
A. EC2
B. AWS Lambda
C. Elastic MapReduce
D. Elastic Container Service
E. AWS Systems Manager
F. Elastic Beanstalk
Breakdown – Answer Selection
Click to edit Master title style
Your R&D team wants to deploy a new application using
Docker containers.
SSM is forWhich servicespatches,
inventory, can be used to
deploy and manage the containers? (pick three)
parameters, and updates
A. EC2
B. AWS Lambda
C. Elastic MapReduce
D. Elastic Container Service
E. AWS Systems Manager
F. Elastic Beanstalk
Breakdown – Answer Selection
Click to edit Master title style
Your R&D team wants to deploy a new application using
Elastic Beanstalk
Docker containers. supports
Which services can be used to
Dockertheascontainers?
deploy and manage a choice (pick
for three)
deployment
A. EC2
B. AWS Lambda
C. Elastic MapReduce
D. Elastic Container Service
E. AWS Systems Manager
F. Elastic Beanstalk
Breakdown – Answer Selection
Click to edit Master title style
Your R&D team wants to deploy a new application using
Docker containers. Which services can be used to
deploy and manageAnswers: ADF (pick three)
the containers?

A. EC2
B. AWS Lambda
C. Elastic MapReduce
D. Elastic Container Service
E. AWS Systems Manager
F. Elastic Beanstalk
AWS Certified SysOps Administrator
Click to edit Master title style
(Associate) Crash Course

Domain 4 – Storage and


Data Management
Data Management
Click to edit Master title style
• 12% of exam content
• Create and manage data retention
• Identify and implement data protection, encryption,
and capacity planning needs
TL; DR
Click to edit Master title style
• Learn differences between automated and manual
backups
• Learn how to copy backups between regions
• Understand impact of encryption on backups
• Identify which backups impact availability
• Know which services enforce compliance
• Learn the four DR scenarios
• Recognize limits of storage services for capacity
planning purposes
Backups – EC2
Click to edit Master title style
• EBS snapshots
• Increase durability
• Option to share across accounts
• Option to copy to different region
• May require volume quiesce (service interruption)
• Ephemeral volumes
• No native backup functionality
• Can do file level sync to S3 or EBS
Backups - RDS
Click to edit Master title style
• No interruption of service
• Daily snapshot
• Can only restore
• Deleted if DB instance terminated
• Manual snapshot
• Share across accounts
• Copy to different region
• Retained after DB instance termination
Backups - Redshift
Click to edit Master title style
• No interruption of service
• Automated snapshot
• Taken after 8 hours or 5Gb/node data change
• Can be automatically copied to different region
• Manual snapshot
• Can be automatically copied to different region
• Can be shared across accounts
• Retained after cluster termination
Backups – DynamoDB
Click to edit Master title style
• No interruption of service
• Legacy – export to S3
• Current - Point-in-time recovery (PITR)
• 35 day retention
• Current – On-demand backup
• Automatically encrypted
Backups – S3
Click to edit Master title style
• Bucket versioning
• Increases cost
• Lifecycle policies for versions
• Cross-region replication
• Even across accounts
• CLI-based copy or sync
Backups – Onsite VMs
Click to edit Master title style
• VM Import/Export
• AWS Connector for vCenter (VMware)
• Mileage may vary
• Launching from AMI and bootstrapping may be
cleaner
Backups – Storage Gateway
Click to edit Master title style
• File gateway
• S3 buckets available as NFS mounts
• Run on-premises or in EC2
• No need for explicit backups
• Volume gateway
• Cached mode – data written to S3, cached locally
• No need for explicit backups
• Stored mode – async backup to S3
• May need file level backups
• Tape gateway
• Backed up automatically to S3
AWS Backup
Click to edit Master title style
• EFS
• Storage Gateway
• DynamoDB
• RDS
• EBS
Manage Backups
Click to edit Master title style
• CLI
• EC2 run command
• Lambda functions
• Data Pipeline
• 3rd party backup software
DR Processes
Click to edit Master title style
Learn the 4 DR scenarios
• Backup and restore
• Pilot light
• Warm standby
• Multi-site solution

https://media.amazonwebservices.com/AWS_Disaster_Recovery.pdf
pages 9-18
DR Scenarios - Highlights
Click to edit Master title style
Backup and restore - preparation

Corporate data center AWS Cloud

Backups of Data into S3


DR Scenarios - Highlights
Click to edit Master title style
Backup and restore - preparation

Corporate data center AWS Cloud

Create AMIs
and network
infrastructure
DR Scenarios - Highlights
Click to edit Master title style
Backup and restore - execution

Corporate data center AWS Cloud

Create ELB
Launch
EC2/RDS
Restore data
DR Scenarios - Highlights
Click to edit Master title style
Backup and restore - execution

Corporate data center AWS Cloud

Perform DNS cutover


Configure monitoring
Configure CI/CD
DR Scenarios - Highlights
Click to edit Master title style
Backup and restore strategic summary

Consideration Score
RTO 4
RPO 4
Cost 1
Time to implement 1
Complexity to manage 1

1 is best, 4 is worst
DR Scenarios - Highlights
Click to edit Master title style
Pilot light - preparation

Corporate data center AWS Cloud

Create AMIs
and network
Infrastructure
Create ELB
DR Scenarios - Highlights
Click to edit Master title style
Pilot light - preparation

Corporate data center AWS Cloud

Launch DB
Configure DB
replication
DR Scenarios - Highlights
Click to edit Master title style
Pilot light - execution

Corporate data center AWS Cloud

Provision EC2
Scale DB
DR Scenarios - Highlights
Click to edit Master title style
Pilot light - execution

Corporate data center AWS Cloud

Promote DB replica
Perform DNS cutover
Configure monitoring
Configure CI/CD
DR Scenarios - Highlights
Click to edit Master title style
Pilot light strategic summary

Consideration Score
RTO 3
RPO 3
Cost 2
Time to implement 2
Complexity to manage 2

1 is best, 4 is worst
DR Scenarios - Highlights
Click to edit Master title style
Warm standby - preparation

Corporate data center AWS Cloud

Create AMIs
and network
Infrastructure
Create ELB
DR Scenarios - Highlights
Click to edit Master title style
Warm standby - preparation

Corporate data center AWS Cloud

Launch DB
Configure 2-way
DB replication
DR Scenarios - Highlights
Click to edit Master title style
Warm standby - preparation

Corporate data center AWS Cloud

Provision EC2
DR Scenarios - Highlights
Click to edit Master title style
Warm standby - preparation

Corporate data center AWS Cloud

Configure DNS ”trickle”


of traffic to AWS
Configure monitoring
Configure CI/CD
DR Scenarios - Highlights
Click to edit Master title style
Warm standby - execution

Corporate data center AWS Cloud

Scale EC2 horizontally


Scale DB vertically
DNS cutover if needed
DR Scenarios - Highlights
Click to edit Master title style
Warm standby strategic summary

Consideration Score
RTO 2
RPO 2
Cost 3
Time to implement 3
Complexity to manage 3

1 is best, 4 is worst
DR Scenarios - Highlights
Click to edit Master title style
Multi site - preparation

Corporate data center AWS Cloud

Create AMIs
and network
Infrastructure
Create ELB
DR Scenarios - Highlights
Click to edit Master title style
Multi site - preparation

Corporate data center AWS Cloud

Launch DB
Configure 2-way
DB replication
DR Scenarios - Highlights
Click to edit Master title style
Multi site - preparation

Corporate data center AWS Cloud

Provision EC2
DR Scenarios - Highlights
Click to edit Master title style
Multi site - preparation

Corporate data center AWS Cloud

Configure DNS for equal


traffic to AWS
Configure monitoring
Configure CI/CD
DR Scenarios - Highlights
Click to edit Master title style
Multi site - execution

Corporate data center AWS Cloud

DNS cutover if needed


Closer to FT/HA than DR
DR Scenarios - Highlights
Click to edit Master title style
Multi site strategic summary

Consideration Score
RTO 1
RPO 1
Cost 4
Time to implement 4
Complexity to manage 4

1 is best, 4 is worst
Enforcing Compliance
Click to edit Master title style
Config Rules

• Passive
• Configuration change or periodic triggers
• Evaluate changes through AWS Config
• Apply built-in rules or custom (Lambda function)
• View Compliance Dashboard for results
Enforcing Compliance
Click to edit Master title style
Service Catalog

• Active
• CloudFormation templates as products
• Constraints act upon provisioning
• Users access Service Catalog, not individual services
Enforcing Compliance
Click to edit Master title style
S3 Lifecycle Policies

• Active
• Rules apply according to object age
• One-way flow of transition/expiration
• Rules can apply to prefixes or full bucket
• Does not require rule for every storage class

S3 Standard S3 IA S3 IA - OneZone Glacier Expire

S3
Enforcing Compliance
Click to edit Master title style
Glacier Vault Lock

• Active
• Use for delete denial (for example)
• 24 hours to verify lock
• Can never be changed once locked
Data Integrity
Click to edit Master title style
Data integrity In-transit
• All AWS API endpoints support SSL
• SSL termination for ELB, CloudFront, API Gateway
• SSL/TLS endpoints for RDS, DynamoDB, RedShift
• VGW/VPN or Direct Connect

Key Terms: SSL, TLS, VPN


Data Integrity
Click to edit Master title style
Data integrity at rest strategies
• Access control
• Server-side encryption
• AWS provided keys
• KMS or CloudHSM provided keys
• Customer provided keys
• Client-side encryption
Data Integrity
Click to edit Master title style
Data integrity at rest options
• EBS volume encryption
• RDS storage-level encryption
• RDS Transparent Database Encryption (TDE)
• SQL Server
• Oracle
• S3 SSE/CSE
• SQS SSE
• DynamoDB SSE (now default)
• RedShift DB Encryption
Data Integrity Operations
Click to edit Master title style
Potential operational impact of encryption at rest
• Backups
• Cross region copies
• Cross account sharing
• Performance
Data Integrity Operations
Click to edit Master title style
Restrictions on encryption
• Learn resources which must be encrypted at
provisioning
• Learn how to remove encryption (not always
simple)
Question Breakdown
Click to edit Master title style
Your application requires access to images stored in S3. The
frequency of access will be no more than 4 times per year, and
the image originals have already been placed in Glacier.
Which S3 storage class would be the most cost-effective for
application access?

A. S3 Standard
B. S3 Infrequent Access
C. S3 One Zone-Infrequent Access
D. Reduced Redundancy Storage
Breakdown – Key Terms
Click to edit Master title style
Your application requires access to images stored in S3. The
frequency of access will be no more than 4 times per year,
and the image originals have already been archived in
Glacier. Which S3 storage class would be the most cost-
effective for application access?

A. S3 Standard
B. S3 Infrequent Access
C. S3 One Zone-Infrequent Access
D. Reduced Redundancy Storage
Breakdown – Answer Selection
Click to edit Master title style
Your application requires access to images stored in S3. The
frequency of access will be no more than 4 times per year,
Standard is the most expensive
and the image originals have already been archived in
Glacier. Which S3 S3 storage
storage classbe the most cost-
class would
effective for application access?

A. S3 Standard
B. S3 Infrequent Access
C. S3 One Zone-Infrequent Access
D. Reduced Redundancy Storage
Breakdown – Answer Selection
Click to edit Master title style
Your application requires access to images stored in S3. The
frequency of access will be no more than 4 times per year,
S3-IA is a good option, not
and the image originals have already been archived in
Glacier. Whichgoing to eliminate
S3 storage yet
class would be the most cost-
effective for application access?

A. S3 Standard
B. S3 Infrequent Access
C. S3 One Zone-Infrequent Access
D. Reduced Redundancy Storage
Breakdown – Answer Selection
Click to edit Master title style
Your application requires access to images stored in S3. The
frequencyZ-IA is a good
of access option
will be no also,
more than andper year,
4 times
cheaper
and the image than
originals S3-IA,
have eliminating
already been archived in
Glacier. Which S3 storage class would be the most cost-
B as a choice
effective for application access?

A. S3 Standard
B. S3 Infrequent Access
C. S3 One Zone-Infrequent Access
D. Reduced Redundancy Storage
Breakdown – Answer Selection
Click to edit Master title style
Your application
RRS was requires access
a legacy to images
option stored in S3. The
for cheaper
frequency of access will be no more than 4 times per year,
storage but due to price decreases
and the image originals have already been archived in
on Standard
Glacier. Which S3 storageand S3-IA,
class wouldnobe
longer
the most cost-
relevant
effective for application access?

A. S3 Standard
B. S3 Infrequent Access
C. S3 One Zone-Infrequent Access
D. Reduced Redundancy Storage
Breakdown – Answer
Click to edit Master title style
Your application requires access to images stored in S3. The
frequency of access will be no more than 4 times per year,
All other choices eliminated
and the image originals have already been archived in
Glacier. Which S3 storageAnswer: C
class would be the most cost-
effective for application access?

A. S3 Standard
B. S3 Infrequent Access
C. S3 One Zone-Infrequent Access
D. Reduced Redundancy Storage
AWS Certified SysOps Administrator
Click to edit Master title style
(Associate) Crash Course

Domain 5 – Security and


Compliance
Security
Click to edit Master title style
• 18% of exam content
• Implement and manage security policies on AWS
• Implement access controls when using AWS
• Differentiate between roles and responsibility within
the shared security model
TL; DR
Click to edit Master title style
• Protect your data using multiple strategies
• There are both active and passive options
• Shared responsibility model defines strategy for
services and features
• Multiple choices for encryption and access control
Anatomy
Click to of anMaster
edit IAM Policy
title style
Version Action
Id NotAction
Statement Resource
Sid NotResource
Effect Condition
Principal
NotPrincipal
IAM Policy
Click Study
to edit Focus
Master title style
Version Action
Id NotAction
Statement Resource
Sid NotResource
Effect Condition
Principal
NotPrincipal
IAM Policy
Click Evaluation
to edit Master title style
Can I do
action X?

Principal
IAM Policy
Click Evaluation
to edit Master title style
Can I do
action X?

Default
Principal answer?
DENY!
IAM Policy
Click Evaluation
to edit Master title style
Default
answer?
Can I do DENY!
action X?

Evaluate all
associated
Principal
policies as a
whole
Identity
based ACL
Resourc
policy e based
policy
IAM Policy
Click Evaluation
to edit Master title style
Default
answer?
Can I do DENY!
action X?

Principal If yes, DENY

Identity
based ACL
Resourc Is there an
policy e based explicit DENY?
policy
IAM Policy
Click Evaluation
to edit Master title style
Default
answer?
Can I do DENY!
action X?

If no, implicit
Principal
DENY

Is there an
Organizations
Service explicit ALLOW?
Control Policy
IAM Policy
Click Evaluation
to edit Master title style
Default
answer?
Can I do DENY!
action X?

If yes, then no,


Principal
implicit DENY

1. Are there
permission 2. If yes, do they
All
boundaries? have an explicit
applicable
policies ALLOW?
IAM Policy
Click Evaluation
to edit Master title style
Default
answer?
Can I do DENY!
action X?

If yes, then no,


Principal
implicit DENY

1. Is the principal
2. If yes, does
Applicable assuming a role?
the role have an
STS policy explicit ALLOW?
IAM Policy
Click Evaluation
to edit Master title style
Default
answer?
Can I do DENY!
action X?

Evaluate all
associated
Principal
policies as a
whole
Identity
based ACL
Resourc
policy e based
policy
IAM Policy
Click Evaluation
to edit Master title style
Default
answer?
Can I do DENY!
action X?

Principal If yes, ALLOW

Identity
based ACL
Resourc Is there an
policy e based explicit ALLOW?
policy
IAM Policy
Click Evaluation
to edit Master title style
Default
answer?
Can I do DENY!
action X?

If no, implicit
Principal
DENY

Identity
based ACL
Resourc Is there an
policy e based explicit ALLOW?
policy
IAM Policy Tips
Click to edit Master title style
• Learn where to use “not”
• NotAction, NotIpAddress, NotResource, etc
• Combine statements
• Policy length limited to 6144 characters
• Edit policies in console to auto-validate JSON
• Learn all condition types and appropriate use
IAM Policy Example Part 1
Click to edit Master title style
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow", Ability to
"Action": "s3:ListAllMyBuckets",
list the
"Resource": "arn:aws:s3:::*",
"Condition": { bucket
"StringLike": { itself
"s3:prefix": [
”s3bucketname"]}}
},
IAM Policy Example Part 2
Click to edit Master title style
{
"Effect": "Allow",
"Action": [
"s3:ListBucket", Allow
"s3:PutObject",
operations
"s3:GetObject",
"s3:GetObjectVersion"], within the
"Resource": [ bucket
"arn:aws:s3::: s3bucketname/*",
"arn:aws:s3::: s3bucketname"]},
IAM Policy Example Part 3
Click to edit Master title style
{
"Effect": ”Deny",
”NotAction": ["s3:*"],
”NotResource": [
"arn:aws:s3::: s3bucketname/*",
"arn:aws:s3::: s3bucketname"]}]}

Deny access to ALL other services and ALL


other S3 buckets
Managing IAM Policies
Click to edit Master title style
• Creation/validation can be achieved in console
• Test policies with Policy Simulator
• Versioning
• Not for inline policies
• Limited to 5 versions per policy document
• Learn how to roll back
• Edit using new version
• Delete policies with care
Reduce IAM Policy Scope
Click to edit Master title style
• Best Practice: Least privilege access
• Familiarize yourself with Access Advisors
• IAM User
• IAM Group
• IAM Role
• IAM Policy
• Audit usage and create more restrictive policies
Resource Level Permissions
Click to edit Master title style
• Applies to several services
• S3/Glacier
• SNS
• SQS
• KMS
• etc
• Also uses JSON but applied to resource, not IAM entity
Ensure Access Controls
Click to edit Master title style
• Cloudtrail
• Config Rules – covered earlier
• Service Catalog – covered earlier
• Glacier Vault Lock – covered earlier
• Macie
• GuardDuty
CloudTrail
Click to edit Master title style
• Enabled by default in all regions
• Audit trail of service API usage
• Enable integration with CloudWatch Logs
• Can consolidate into single S3 bucket from multiple
accounts
• CloudTrail logs use SSE by default
• Can enable log file integrity validation
• S3 Bucket and lifecycle policies for log protection
Macie
Click to edit Master title style
• Discover, classify and protect sensitive data in S3
• Uses machine learning
• Understands scope of PCI, HIPAA, etc
• Generates alerts which can lead to actions
• Can specify which S3 buckets to protect
• Monitors subset of CloudTrail logs
• Passive service
GuardDuty
Click to edit Master title style
• Managed threat detection on your AWS resources
• Unusual API calls
• Unusual system deployments
• Can detect compromised EC2 instances
• Can detect brute force attacks
• Can be configured as an active service
• Disable API keys
• Tip: Integrate with CW Events!
Shared Responsibility Model
Click to edit Master title style
https://aws.amazon.com/compliance/shared-
responsibility-model/
• Nothing new, vendors have used this for years
• Fundamental concept for working with AWS
• Responsibility split between AWS and customer
Shared Responsibility Model
Click to edit Master title style
Infrastructure services
Shared Responsibility Model
Click to edit Master title style
Container services
Shared Responsibility Model
Click to edit Master title style
Abstract services
Security Assessment
Click to edit Master title style
• Inspector – EC2 OS security audit service
• Macie – S3 and CloudTrail
• Guard Duty – CloudTrail, VPC Flow Logs and EC2
• CloudTrail log analysis – very flexible
• Security Hub - NEW!!!
Penetration Testing
Click to edit Master title style
https://aws.amazon.com/security/penetration-testing/

• Limited scope allowed


• Read the list of prohibited activities
• No permission required
Question Breakdown
Click to edit Master title style
AWS CloudTrail logs API requests to resources in your
account. Which additional service can you use to track
and visualize changes made on those resources?

A. AWS Config
B. KMS
C. Amazon Inspector
D. AWS CloudFormation
Breakdown – Key Terms
Click to edit Master title style
AWS CloudTrail logs API requests to resources in your
account. Which additional service can you use to track
and visualize changes made on those resources?

A. AWS Config
B. KMS
C. Amazon Inspector
D. AWS CloudFormation
Breakdown – Answer Selection
Click to edit Master title style
AWS Cloudtrail logs API requests to resources in your
Config
account. Which allowsservice
additional for resource
can you use to track
and visualize change tracking
changes made andresources?
on those
visualization
A. AWS Config
B. KMS
C. Amazon Inspector
D. AWS CloudFormation
Breakdown – Answer Selection
Click to edit Master title style
AWS Cloudtrail logs API requests to resources in your
account. Which additional service can you use to track
KMS manages
and visualize changes madeencryption keys
on those resources?

A. AWS Config
B. KMS
C. Amazon Inspector
D. AWS CloudFormation
Breakdown – Answer Selection
Click to edit Master title style
AWS Cloudtrail logs API requests to resources in your
account. Which additional
Inspector is service
used forcanOS
you use to track
and visualize changes made on those resources?
security audit tasks

A. AWS Config
B. KMS
C. Amazon Inspector
D. AWS CloudFormation
Breakdown – Answer Selection
Click to edit Master title style
AWS Cloudtrail logs API requests to resources in your
account.CloudFormation is designed
Which additional service can you for
use to track
automated
and visualize deployment
changes made of
on those resources?
resources
A. AWS Config
B. KMS
C. Amazon Inspector
D. AWS CloudFormation
Breakdown – Answer
Click to edit Master title style
AWS Cloudtrail logs API requests to resources in your
account. Which additional service can you use to track
Answer:
and visualize changes made onAthose resources?

A. AWS Config
B. KMS
C. Amazon Inspector
D. AWS CloudFormation
AWS Certified SysOps Administrator
Click to edit Master title style
(Associate) Crash Course

Domain 6 - Networking
Networking
Click to edit Master title style
• 14% of exam content
• Apply AWS networking features
• Implement connectivity features of AWS
• Gather and interpret relevant information for network
troubleshooting
TL; DR
Click to edit Master title style
• Ability to create VPC from scratch is a requirement
• Many of your resources could be outside VPC
• VPC security groups for whitelisting, NACLs for
blacklisting
• VPC route tables are for traffic egress
• ELB/ALB/NLB each have specific use cases
• Know when VPC Flow Logs are required for
troubleshooting
• Recognize common causes of connectivity issues
Implement Networking Features
Click to edit Master title style
• Understanding service scope
• Many services don’t allow network choices
• VPC networking
• CloudFront
• Elastic Load Balancing
• Route 53
VPC Networking Limits
Click to edit Master title style
Learn the default limits and which can be
increased when required

• Subnets • Route Tables


• EIPs • Security Groups
• Flow Logs • VPC Peering
• Gateways Connections
• NACLs • VPC Endpoints
• ENIs • VPN Connections
VPC External Egress/Ingress
Click to edit Master title style
Learn the operations and prerequisites for each

• Internet Gateway
• Virtual Private Gateway
• VPC Endpoint
• VPC Peering Connection
VPC IP Address Space
Click to edit Master title style
• Private IP ranges
• All networking features available
• RFC1918 compliance
• 10.0.0.0-10.0.255.255
• 172.16.0.0-172.31.255.255
• 192.168.0.0-192.168.255.255
VPC IP Address Space, con’td
Click to edit Master title style
• Supported networks from /16 to /28 in size
• AWS reserves 5 IP addresses from each subnet

• Bring your own IP range


• Traffic routed to your VPC through AWS
VPC IPv6
Click to edit Master title style
• IPv6 supported
• Even in the same VPC as IPv4!
• IPv6 separates ingress and egress gateways for
Internet
• IP range is /56
• Fixed size
• Allocated from AWS block, no option to select
VPC Egress/Ingress Key Concepts
Click to edit Master title style
• NACLs operate at subnet boundary
• Security groups operate at EC2 host OS boundary
• Host-based firewalls operate at EC2 guest OS
boundary
• In-line gateways and proxy servers can provide Layer
7 customization
• NAT Gateways integrate with route tables
• Route tables cannot allow/deny traffic between VPC
subnets
VPC Route Table Operations
Click to edit Master title style
• Update route tables when external networks change
• Can be automated (think Lambda functions)
• Consider one route table per subnet to minimize
impact of improper change
VPC NACL Operations
Click to edit Master title style
• Use NACL for blacklisting (deny traffic)
• Can automate blacklist updates by integrating with
VPC Flow Logs and Lambda
• Maintain gaps between rule numbers as they are
evaluated in order
VPC Security Group Operations
Click to edit Master title style
• Delegate ownership to Devops team
• Use for whitelisting (no deny allowed)
• Consider deleting default outbound rule that allows all
traffic
• Replace with least privilege outbound rules
• Monitor changes with AWS Config
VPC Troubleshooting Operations
Click to edit Master title style
• Enable VPC Flow Logs on ENI, Subnet or VPC
• Use host-based tools for testing network connectivity
• Check CloudTrail logs
• Enable AWS Config and view resource configuration
CloudFront Operations
Click to edit Master title style
• Modify DNS cname list
• Update SSL certificate
• Change allowed edge locations
• Associate a Web ACL

Tip: Understand how to make assets private


Elastic Load Balancing Operations
Click to edit Master title style
• Manage instances (CLB) or target groups (ALB/NLB)
• Update SSL settings or certificate
• Update listeners

Tip: learn differences between the CLB, ALB, NLB


Implement Connectivity Features
Click to edit Master title style
Virtual Private Gateway (VGW)
• VPC only
• Supported list of customer gateways
• Encrypts data in transit
• Highly available by default (2 endpoints)
Implement Connectivity Features
Click to edit Master title style
Direct Connect
• VPC network connectivity
• AWS service API endpoint connectivity
• Cross account features
• Does not encrypt data in transit natively
• Can be integrated with VGW and VPN
• Not highly available by default
Implement Connectivity Features
Click to edit Master title style
Resource Access Manager
• Resource sharing between AWS accounts
• Great use case for Organizations

Resources shared
• Route 53 resolver rules
• AWS Transit Gateways
• Subnets
• AWS License Manager Configurations
Question Breakdown
Click to edit Master title style
You suspect that one of your EC2 instances is the target
of a brute force hacking attempt. Which features could
you use to verify this claim? (pick 3)

A. Check NACL entries


B. Enable VPC Flow Logs and explore the log output
C. Check findings in GuardDuty
D. Check findings in AWS Inspector
E. Explore system logs on the EC2 instance OS
Breakdown – Key Terms
Click to edit Master title style
You suspect that one of your EC2 instances is the target
of a brute force hacking attempt. Which features could
you use to verify this claim? (pick 3)

A. Check NACL entries


B. Enable VPC Flow Logs and explore the log output
C. Check findings in GuardDuty
D. Check findings in AWS Inspector
E. Explore system logs on the EC2 instance OS
Breakdown – Answer Selection
Click to edit Master title style
You suspect that one of your EC2 instances is the target
of a brute force hacking
NACL entries attempt. Which
don’t track features could
usage
you use to verify this claim? (pick 3)
explicitly

A. Check NACL entries


B. Enable VPC Flow Logs and explore the log output
C. Check findings in GuardDuty
D. Check findings in AWS Inspector
E. Explore system logs on the EC2 instance OS
Breakdown – Answer Selection
Click to edit Master title style
You suspect that one of your EC2 instances is the target
Flow
of a brute forceLog output
hacking would
attempt. indicate
Which features could
you use traffic
to verifyfrom a single
this claim? (picksource
3) to a
specific port
A. Check NACL entries
B. Enable VPC Flow Logs and explore the log output
C. Check findings in GuardDuty
D. Check findings in AWS Inspector
E. Explore system logs on the EC2 instance OS
Breakdown – Answer Selection
Click to edit Master title style
You suspect that one of your EC2 instances is the target
of a brute force hacking attempt.
GuardDuty reportsWhich
on features could
you use to verify this claim? (pick 3)
suspicious EC2 network activity

A. Check NACL entries


B. Enable VPC Flow Logs and explore the log output
C. Check findings in GuardDuty
D. Check findings in AWS Inspector
E. Explore system logs on the EC2 instance OS
Breakdown – Answer Selection
Click to edit Master title style
You suspect that one of your EC2 instances is the target
of a bruteInspector evaluates
force hacking rulesWhich
attempt. to testfeatures
OS could
for security
you use to verify vulnerabilities,
this claim? (pick 3) not
hacking attempts

A. Check NACL entries


B. Enable VPC Flow Logs and explore the log output
C. Check findings in GuardDuty
D. Check findings in AWS Inspector
E. Explore system logs on the EC2 instance OS
Breakdown – Answer Selection
Click to edit Master title style
You suspect that one of your EC2 instances is the target
of a brute
OSforce
logshacking attempt. Which
could absolutely features could
show proof
you use to verify this
of brute claim?
force (pick 3)attempt
intrusion

A. Check NACL entries


B. Enable VPC Flow Logs and explore the log output
C. Check findings in GuardDuty
D. Check findings in AWS Inspector
E. Explore system logs on the EC2 instance OS
Breakdown – Answer
Click to edit Master title style
You suspect that one of your EC2 instances is the target
of a brute force hacking attempt. Which features could
you use to verify thisAnswers: BCE3)
claim? (pick

A. Check NACL entries


B. Enable VPC Flow Logs and explore the log output
C. Check findings in GuardDuty
D. Check findings in AWS Inspector
E. Explore system logs on the EC2 instance OS
Question Breakdown
Click to edit Master title style
Your application consists of two EC2 instances that
require high node-to-node network throughput and low
latency. What configuration choices can meet these
requirements?

A. I3 instance type and same VPC subnet.


B. R3 instance type and jumbo frames in the VPC.
C. C5 instance type, same subnet and enhanced
networking.
D. T2 instance type, same subnet, jumbo frames
Breakdown – Key Terms
Click to edit Master title style
Your application consists of two EC2 instances that
require high node-to-node network throughput and
low latency. What configuration choices can meet these
requirements?

A. I3 instance type and same VPC subnet.


B. R3 instance type and jumbo frames in the VPC.
C. C5 instance type, same subnet and enhanced
networking.
D. T2 instance type, same subnet, jumbo frames
Breakdown – Answer Selection
Click to edit Master title style
Your application consists of two EC2 instances that
require high node-to-node
Ensures same AZ network throughput and
but doesn’t
low latency. What configuration choices can meet these
requirements?
address throughput

A. I3 instance type and same VPC subnet.


B. R3 instance type and jumbo frames in the VPC.
C. C5 instance type, same subnet and enhanced
networking.
D. T2 instance type, same subnet, jumbo frames
Breakdown – Answer Selection
Click to edit Master title style
Your application consists of two EC2 instances that
require high Doesn’t
node-to-node network
address throughput and
either
low latency. What configuration choices can meet these
requirements?
requirement

A. I3 instance type and same VPC subnet.


B. R3 instance type and jumbo frames in the VPC.
C. C5 instance type, same subnet and enhanced
networking.
D. T2 instance type, same subnet, jumbo frames
Breakdown – Answer Selection
Click to edit Master title style
Your application consists of two EC2 instances that
C5node-to-node
require high addresses throughput, same
network throughput and
subnet
low latency. and
What enhanced networking
configuration choices can meet these
requirements? addresses latency

A. I3 instance type and same VPC subnet.


B. R3 instance type and jumbo frames in the VPC.
C. C5 instance type, same subnet and enhanced
networking.
D. T2 instance type, same subnet, jumbo frames
Breakdown – Answer Selection
Click to edit Master title style
Your application consists of two EC2 instances that
require high node-to-node
T2 is a bad network
choice throughput
for and
low latency. What configuration choices can meet these
requirements?
throughput

A. I3 instance type and same VPC subnet.


B. R3 instance type and jumbo frames in the VPC.
C. C5 instance type, same subnet and enhanced
networking.
D. T2 instance type, same subnet, jumbo frames
Breakdown – Answer Selection
Click to edit Master title style
Your application consists of two EC2 instances that
require high node-to-node network throughput and
Answer: Cchoices can meet these
low latency. What configuration
requirements?

A. I3 instance type and same VPC subnet.


B. R3 instance type and jumbo frames in the VPC.
C. C5 instance type, same subnet and enhanced
networking.
D. T2 instance type, same subnet, jumbo frames
AWS Certified SysOps Administrator
Click to edit Master title style
(Associate) Crash Course

Domain 7 – Automation
and Optimization
Automation and Optimization
Click to edit Master title style
• 12% of exam content
• Use AWS services and features to manage and assess
resource utilization
• Employ cost-optimization strategies for efficient
resource utilization
• Automate manual or repeatable process to minimize
management overhead
TL; DR
Click to edit Master title style
• Monitor utilization to assist with optimization
• Organize resources using tags
• Take advantage of tiered pricing and discounts
• Managed services have lower TCO than unmanaged
• Scale horizontally in small increments for higher
efficiency
• Architect infrastructures with automation as a goal
Resource Utilization
Click to edit Master title style
Trusted
CloudWatch
Advisor

Detailed Resource
Billing Report Tags
Cost Optimization
Click to edit Master title style
• Start by understanding your monthly bill
• EC2 cost models
• Temporary resources
• Managed services
• Trusted Advisor dashboard reports

Strategy 1– when multiple implementation options are


present, understand cost differences
Strategy 2 – read the Well-Architected Framework
whitepaper on Cost Optimization
Billing Analysis Options
Click to edit Master title style
• Detailed Billing Report
• Billing Console
• Budgets
• Billing metrics in Cloudwatch
• Estimated charges
• Alarms with actions, not just notifications
• EC2 Marketplace products
• EMR and custom analysis
Consolidated Billing
Click to edit Master title style
• NOT HIERARCHICAL
• Multiple linked accounts
• Designated payer account
• Cost Optimization
• Combined volume discounts
• Combined EC2 reservations
Free Services
Click to edit Master title style
100% Free Free with asterisk
IAM VPC
CloudTrail CloudWatch
Auto Scaling Other Free Tier services
CloudFormation AWS Certificate Manager
VPC Cost Asterisk
Click to edit Master title style
Free Charged
Internet Gateway Virtual Private Gateway
VPC Endpoints for S3 and DDB All other VPC Endpoints
Same-AZ traffic within VPC Cross-AZ traffic
VPC Peering traffic
Nat Gateway
Flow Logs
Minimizing Overhead
Click to edit Master title style

Managed Temporary Resource


Automation Tools
Services Resources Organization
• RDS • Auto Scaling • CloudFormatio • Tags
n
• Lambda
Overhead, Tags, and You
Click to edit Master title style
Tagging is among the most important concepts when
working with AWS resources

• How many tags allowed per resource? 50


• Tags allow 127/255 chars for keys and values
• aws: is reserved
• Great for operations, billing, organization
• Devise a tagging strategy and enforce upon resource
provisioning
Features that require tags
Click to edit Master title style
Inspector

SSM Run Command

Cost Allocation reports

Resource Groups
AWS Organizations
Click to edit Master title style
Manage multiple AWS accounts
• Hierarchical grouping of accounts
• Treat accounts like OU
• Automatically apply policies to new accounts

Operational ramifications
• Automated cross-account service integration
• Programmatic account creation
• Disables Detailed Billing console for child accounts
Question Breakdown
Click to edit Master title style
Your company has a large number of EBS snapshots that
have collected over time. You’ve been asked to remove
old snapshots and implement snapshot rotation in the
most efficient method. Which of the following
accomplishes this? (pick two)

A. View snapshot creation dates from the console and delete as


needed
B. Write a shell script to delete snapshots older than a given date
C. Implement Amazon Data Lifecycle Manager
D. Implement a Lambda function in Python to rotate snapshots
Breakdown – Key Terms
Click to edit Master title style
Your company has a large number of EBS snapshots that
have collected over time. You’ve been asked to remove
old snapshots and implement snapshot rotation in the
most efficient method. Which of the following
accomplishes this? (pick two)

A. View snapshot creation dates from the console and delete as


needed
B. Write a shell script to delete snapshots older than a given date
C. Implement Amazon Data Lifecycle Manager
D. Implement a Lambda function in Python to rotate snapshots
Breakdown – Answer Selection
Click to edit Master title style
Your company has a large number of EBS snapshots that
have collected over time.doesn’t
Inefficient, You’ve been asked to remove
address
old snapshots and implement snapshot rotation in the
rotation
most efficient method. Which of the following
accomplishes this? (pick two)

A. View snapshot creation dates from the console and delete as


needed
B. Write a shell script to delete snapshots older than a given date
C. Implement Amazon Data Lifecycle Manager
D. Implement a Lambda function in Python to rotate snapshots
Breakdown – Answer Selection
Click to edit Master title style
Your company has a large number of EBS snapshots that
have collected over time.
Addresses theYou’ve beenof
removal asked
oldto remove
old snapshots and implement snapshot rotation in the
snapshots
most efficient method. Which of the following
accomplishes this? (pick two)

A. View snapshot creation dates from the console and delete as


needed
B. Write a shell script to delete snapshots older than a given
date
C. Implement Amazon Data Lifecycle Manager
D. Implement a Lambda function in Python to rotate snapshots
Breakdown – Answer Selection
Click to edit Master title style
Your company has a large number of EBS snapshots that
have collected over time.rotation
Implements You’ve been
in aasked
fullyto remove
old snapshots and implement snapshot rotation in the
automated fashion
most efficient method. Which of the following
accomplishes this? (pick two)

A. View snapshot creation dates from the console and delete as


needed
B. Write a shell script to delete snapshots older than a given date
C. Implement Amazon Data Lifecycle Manager
D. Implement a Lambda function in Python to rotate snapshots
Breakdown – Answer Selection
Click to edit Master title style
Your company has a large number of EBS snapshots that
Doesn’t
have collected overaddress initial
time. You’ve beendelete.
asked to remove
Risk ofand
old snapshots obsolescence if code
implement snapshot not in the
rotation
most efficient method.updated.
Which of the following
accomplishes this? (pick two)

A. View snapshot creation dates from the console and delete as


needed
B. Write a shell script to delete snapshots older than a given date
C. Implement Amazon Data Lifecycle Manager
D. Implement a Lambda function in Python to rotate snapshots
Breakdown – Answer Selection
Click to edit Master title style
Your company has a large number of EBS snapshots that
have collected over time. You’ve been asked to remove
Answers:
old snapshots and implementB and C rotation in the
snapshot
most efficient method. Which of the following
accomplishes this? (pick two)

A. View snapshot creation dates from the console and delete as


needed
B. Write a shell script to delete snapshots older than a given date
C. Implement Amazon Data Lifecycle Manager
D. Implement a Lambda function in Python to rotate snapshots
AWS Certified SysOps Administrator
Click to edit Master title style
(Associate) Crash Course

Further Study
AWS Whitepapers
Click to edit Master title style
https://aws.amazon.com/whitepapers/

• Overview of Security Processes


• Storage Options in the Cloud
• Defining Fault Tolerant Applications in the AWS Cloud
• Overview of Amazon Web Services
• Compliance Whitepaper
• Architecting for the AWS Cloud
Well-Architected Framework
Click to edit Master title style
https://aws.amazon.com/architecture/well-architected/

• Main whitepaper
• Whitepaper for each of the 5 pillars
• Focus on Operational Excellence!
• Well-Architected lens whitepapers (2 more!)
Get Out and Do Something!
Click to edit Master title style
https://aws.amazon.com/free/
Create an account

https://aws.amazon.com/getting-started/labs/
Self-paced labs hosted by qwikLABS

https://aws.amazon.com/getting-started/tutorials/
10-Minute Tutorials
AWS Certified SysOps Administrator
Click to edit Master title style
(Associate) Crash Course

Q&A

Das könnte Ihnen auch gefallen